Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-23133
Vulnerability from cvelistv5
Published
2021-04-22 18:00
Modified
2024-09-16 19:04
Severity ?
EPSS score ?
Summary
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Linux Kernel | Linux Kernel |
Version: unspecified < 5.12-rc8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2021/04/18/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" }, { "name": "FEDORA-2021-8cd093f639", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/" }, { "name": "FEDORA-2021-e6b4847979", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/" }, { "name": "FEDORA-2021-a963f04012", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/1" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/2" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/4" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0008/" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Linux Kernel", "vendor": "Linux Kernel", "versions": [ { "lessThan": "5.12-rc8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Or Cohen from Palo Alto Networks" } ], "datePublic": "2021-04-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-23T01:08:23", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2021/04/18/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" }, { "name": "FEDORA-2021-8cd093f639", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/" }, { "name": "FEDORA-2021-e6b4847979", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/" }, { "name": "FEDORA-2021-a963f04012", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/1" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/2" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/4" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/05/10/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0008/" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Linux kernel 5.12-rc8." } ], "source": { "discovery": "EXTERNAL" }, "title": "Linux Kernel sctp_destroy_sock race condition", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2021-04-13T10:25:00.000Z", "ID": "CVE-2021-23133", "STATE": "PUBLIC", "TITLE": "Linux Kernel sctp_destroy_sock race condition" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux Kernel", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.12-rc8" } ] } } ] }, "vendor_name": "Linux Kernel" } ] } }, "credit": [ { "lang": "eng", "value": "Or Cohen from Palo Alto Networks" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openwall.com/lists/oss-security/2021/04/18/2", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/2" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" }, { "name": "FEDORA-2021-8cd093f639", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/" }, { "name": "FEDORA-2021-e6b4847979", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/" }, { "name": "FEDORA-2021-a963f04012", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/10/1" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/10/2" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/10/4" }, { "name": "[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/05/10/3" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0008/" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "name": "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Linux kernel 5.12-rc8." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2021-23133", "datePublished": "2021-04-22T18:00:18.880759Z", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-09-16T19:04:20.684Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-23133\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2021-04-22T18:15:08.123\",\"lastModified\":\"2024-11-21T05:51:16.080\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.\"},{\"lang\":\"es\",\"value\":\"Una condici\u00f3n de carrera en los sockets SCTP del kernel de Linux (el archivo net/sctp/socket.c) versiones anteriores a 5.12-rc8, puede conllevar a una escalada de privilegios del kernel desde el contexto de un servicio de red o un proceso no privilegiado.\u0026#xa0;Si la funci\u00f3n sctp_destroy_sock es llamado sin sock_net (sk) -) sctp.addr_wq_lock, un elemento es eliminado de la lista auto_asconf_splist sin ning\u00fan bloqueo apropiado.\u0026#xa0;Esto puede ser explotado por un atacante con privilegios de servicio de red para escalar a root o desde el contexto de un usuario no privilegiado directamente si un BPF_CGROUP_INET_SOCK_CREATE es adjuntado que niega la creaci\u00f3n de alg\u00fan socket SCTP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":6.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.232\",\"matchCriteriaId\":\"AA37000C-4A14-43C9-85B7-38769DC96041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.189\",\"matchCriteriaId\":\"DCCA659A-B6C8-4D6E-9598-364709A6D261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.114\",\"matchCriteriaId\":\"997A4C67-E4A2-4FCD-A826-F74DB7AD54CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.32\",\"matchCriteriaId\":\"7219CE54-2A13-423E-915D-1D30ADB4BE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.16\",\"matchCriteriaId\":\"73E1B19B-5CED-4857-9364-96E77B8A8EAC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\\u0026_hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D700C5-F67F-4FFB-BE69-D524592A3D2E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390BCCEF-BD91-426B-B89C-D9371A02FA9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"108A2215-50FB-4074-94CF-C130FA14566D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F0B6C0-F930-480D-962B-3F4EFDCC13C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803BC414-B250-4E3A-A478-A3881340D6B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEB3337-BFDE-462A-908B-176F92053CEC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736AEAE9-782B-4F71-9893-DED53367E102\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/1\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/2\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/3\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/4\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/\",\"source\":\"psirt@paloaltonetworks.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/\",\"source\":\"psirt@paloaltonetworks.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/\",\"source\":\"psirt@paloaltonetworks.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210611-0008/\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/04/18/2\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/05/10/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210611-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/04/18/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2021:2453-1
Vulnerability from csaf_suse
Published
2021-07-22 11:16
Modified
2021-07-22 11:16
Summary
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_51 fixes several issues.
The following security issues were fixed:
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2453,SUSE-SLE-Live-Patching-12-SP5-2021-2452,SUSE-SLE-Live-Patching-12-SP5-2021-2453
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_51 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2453,SUSE-SLE-Live-Patching-12-SP5-2021-2452,SUSE-SLE-Live-Patching-12-SP5-2021-2453", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2453-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2453-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212453-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2453-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009202.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP5)", "tracking": { "current_release_date": "2021-07-22T11:16:48Z", "generator": { "date": "2021-07-22T11:16:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2453-1", "initial_release_date": "2021-07-22T11:16:48Z", "revision_history": [ { "date": "2021-07-22T11:16:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-22T11:16:48Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_51-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_54-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-22T11:16:48Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:1887-1
Vulnerability from csaf_suse
Published
2021-06-08 13:07
Modified
2021-06-08 13:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
The following non-security bugs were fixed:
- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- ARM: footbridge: fix PCI interrupt mapping (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- Avoid potentially erroneos RST drop (bsc#1183947).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- EDAC/amd64: Gather hardware information early (bsc#1180552).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).
- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- NFSv4: Replace closed stateids with the 'invalid special stateid' (bsc#1185481).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: fix return value for unsupported ioctls (git-fixes).
- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).
- bpf: Fix masking negation logic upon negative dst register (git-fixes).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).
- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).
- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: net: fix memory leak in atusb_probe (git-fixes).
- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gianfar: Handle error code at MAC address change (git-fixes).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igb: check timestamp validity (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta->fast_rx when STA removed from 4-addr VLAN (git-fixes).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (bsc#1112374).
- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mt7601u: fix always true expression (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx4_en: update moderation when config reset (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb->protocol set (bsc#1176081).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).
- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).
- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).
- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nvme-fc: clear q_live at beginning of association teardown (git-fixes).
- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: lewisburg: Update number of pins in community (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).
- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).
- sata_mv: add IRQ checks (git-fixes).
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186452).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).
- soc: qcom: mdt_loader: Validate that p_filesz < p_memsz (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (bsc#1109837).
Patchnames
SUSE-2021-1887,SUSE-SLE-SERVER-12-SP5-2021-1887
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1887,SUSE-SLE-SERVER-12-SP5-2021-1887", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1887-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1887-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211887-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1887-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113431", "url": "https://bugzilla.suse.com/1113431" }, { "category": "self", "summary": "SUSE Bug 1126390", "url": "https://bugzilla.suse.com/1126390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1174682", "url": "https://bugzilla.suse.com/1174682" }, { "category": "self", "summary": "SUSE Bug 1176081", "url": "https://bugzilla.suse.com/1176081" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1180552", "url": "https://bugzilla.suse.com/1180552" }, { "category": "self", "summary": "SUSE Bug 1181383", "url": "https://bugzilla.suse.com/1181383" }, { "category": "self", "summary": "SUSE Bug 1182256", "url": "https://bugzilla.suse.com/1182256" }, { "category": "self", "summary": "SUSE Bug 1183738", "url": "https://bugzilla.suse.com/1183738" }, { "category": "self", "summary": "SUSE Bug 1183754", "url": "https://bugzilla.suse.com/1183754" }, { "category": "self", "summary": "SUSE Bug 1183947", "url": "https://bugzilla.suse.com/1183947" }, { "category": "self", "summary": "SUSE Bug 1184040", "url": "https://bugzilla.suse.com/1184040" }, { "category": "self", "summary": "SUSE Bug 1184081", "url": "https://bugzilla.suse.com/1184081" }, { "category": "self", "summary": "SUSE Bug 1184082", "url": "https://bugzilla.suse.com/1184082" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184675", "url": "https://bugzilla.suse.com/1184675" }, { "category": "self", "summary": "SUSE Bug 1184855", "url": "https://bugzilla.suse.com/1184855" }, { "category": "self", "summary": "SUSE Bug 1185428", "url": "https://bugzilla.suse.com/1185428" }, { "category": "self", "summary": "SUSE Bug 1185481", "url": "https://bugzilla.suse.com/1185481" }, { "category": "self", "summary": "SUSE Bug 1185642", "url": "https://bugzilla.suse.com/1185642" }, { "category": "self", "summary": "SUSE Bug 1185680", "url": "https://bugzilla.suse.com/1185680" }, { "category": "self", "summary": "SUSE Bug 1185703", "url": "https://bugzilla.suse.com/1185703" }, { "category": "self", "summary": "SUSE Bug 1185724", "url": "https://bugzilla.suse.com/1185724" }, { "category": "self", "summary": "SUSE Bug 1185758", "url": "https://bugzilla.suse.com/1185758" }, { "category": "self", "summary": "SUSE Bug 1185859", "url": "https://bugzilla.suse.com/1185859" }, { "category": "self", "summary": "SUSE Bug 1185860", "url": "https://bugzilla.suse.com/1185860" }, { "category": "self", "summary": "SUSE Bug 1185863", "url": "https://bugzilla.suse.com/1185863" }, { "category": "self", "summary": "SUSE Bug 1185898", "url": "https://bugzilla.suse.com/1185898" }, { "category": "self", "summary": "SUSE Bug 1185899", "url": "https://bugzilla.suse.com/1185899" }, { "category": "self", "summary": "SUSE Bug 1185906", "url": "https://bugzilla.suse.com/1185906" }, { "category": "self", "summary": "SUSE Bug 1185938", "url": "https://bugzilla.suse.com/1185938" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186062", "url": "https://bugzilla.suse.com/1186062" }, { "category": "self", "summary": "SUSE Bug 1186285", "url": "https://bugzilla.suse.com/1186285" }, { "category": "self", "summary": "SUSE Bug 1186416", "url": "https://bugzilla.suse.com/1186416" }, { "category": "self", "summary": "SUSE Bug 1186439", "url": "https://bugzilla.suse.com/1186439" }, { "category": "self", "summary": "SUSE Bug 1186441", "url": "https://bugzilla.suse.com/1186441" }, { "category": "self", "summary": "SUSE Bug 1186460", "url": "https://bugzilla.suse.com/1186460" }, { "category": "self", "summary": "SUSE Bug 1186484", "url": "https://bugzilla.suse.com/1186484" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-06-08T13:07:24Z", "generator": { "date": "2021-06-08T13:07:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1887-1", "initial_release_date": "2021-06-08T13:07:24Z", "revision_history": [ { "date": "2021-06-08T13:07:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.59.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.59.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.59.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.59.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.59.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.59.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.59.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.59.1.x86_64", "product_id": "kernel-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.59.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.59.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.59.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.59.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.59.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.59.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.59.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.59.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.59.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.59.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.59.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:07:24Z", "details": "important" } ], "title": "CVE-2021-3491" } ] }
suse-su-2021:2344-1
Vulnerability from csaf_suse
Published
2021-07-14 15:09
Modified
2021-07-14 15:09
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_48 fixes several issues.
The following security issues were fixed:
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2344,SUSE-SLE-Live-Patching-12-SP4-2021-2336,SUSE-SLE-Live-Patching-12-SP4-2021-2337,SUSE-SLE-Live-Patching-12-SP4-2021-2340,SUSE-SLE-Live-Patching-12-SP5-2021-2338,SUSE-SLE-Live-Patching-12-SP5-2021-2348,SUSE-SLE-Module-Live-Patching-15-2021-2341,SUSE-SLE-Module-Live-Patching-15-2021-2342,SUSE-SLE-Module-Live-Patching-15-2021-2343,SUSE-SLE-Module-Live-Patching-15-2021-2344,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2334,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2335
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_48 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2344,SUSE-SLE-Live-Patching-12-SP4-2021-2336,SUSE-SLE-Live-Patching-12-SP4-2021-2337,SUSE-SLE-Live-Patching-12-SP4-2021-2340,SUSE-SLE-Live-Patching-12-SP5-2021-2338,SUSE-SLE-Live-Patching-12-SP5-2021-2348,SUSE-SLE-Module-Live-Patching-15-2021-2341,SUSE-SLE-Module-Live-Patching-15-2021-2342,SUSE-SLE-Module-Live-Patching-15-2021-2343,SUSE-SLE-Module-Live-Patching-15-2021-2344,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2334,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2335", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2344-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2344-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212344-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2344-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE Bug 1187687", "url": "https://bugzilla.suse.com/1187687" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0605 page", "url": "https://www.suse.com/security/cve/CVE-2021-0605/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP1)", "tracking": { "current_release_date": "2021-07-14T15:09:28Z", "generator": { "date": "2021-07-14T15:09:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2344-1", "initial_release_date": "2021-07-14T15:09:28Z", "revision_history": [ { "date": "2021-07-14T15:09:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T15:09:28Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0605" } ], "notes": [ { "category": "general", "text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0605", "url": "https://www.suse.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "SUSE Bug 1187601 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187601" }, { "category": "external", "summary": "SUSE Bug 1187687 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187687" }, { "category": "external", "summary": "SUSE Bug 1188381 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1188381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T15:09:28Z", "details": "important" } ], "title": "CVE-2021-0605" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_65-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_71-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_29-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_32-default-14-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_51-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_58-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_63-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T15:09:28Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2387-1
Vulnerability from csaf_suse
Published
2021-07-16 10:01
Modified
2021-07-16 10:01
Summary
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.
The following security issues were fixed:
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2387,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2379,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2380,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2381,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2382,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2387,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2388
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_29 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2387,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2379,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2380,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2381,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2382,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2387,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2388", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2387-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2387-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212387-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2387-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009153.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2)", "tracking": { "current_release_date": "2021-07-16T10:01:59Z", "generator": { "date": "2021-07-16T10:01:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2387-1", "initial_release_date": "2021-07-16T10:01:59Z", "revision_history": [ { "date": "2021-07-16T10:01:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_34-preempt-9-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_34-preempt-9-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_34-preempt-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T10:01:59Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_12-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_15-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_24-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_29-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_34-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_37-default-9-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T10:01:59Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2577-1
Vulnerability from csaf_suse
Published
2021-07-30 15:51
Modified
2021-07-30 15:51
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.
The following security issues were fixed:
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)
- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)
- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)
- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)
- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)
- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)
- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)
Patchnames
SUSE-2021-2577,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2577
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)\n- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)\n- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)\n- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)\n- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)\n- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)\n- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)\n- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)\n- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)\n- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)\n- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)\n- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2577,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2577", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2577-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2577-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212577-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2577-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" }, { "category": "self", "summary": "SUSE Bug 1182717", "url": "https://bugzilla.suse.com/1182717" }, { "category": "self", "summary": "SUSE Bug 1183120", "url": "https://bugzilla.suse.com/1183120" }, { "category": "self", "summary": "SUSE Bug 1183491", "url": "https://bugzilla.suse.com/1183491" }, { "category": "self", "summary": "SUSE Bug 1183658", "url": "https://bugzilla.suse.com/1183658" }, { "category": "self", "summary": "SUSE Bug 1184171", "url": "https://bugzilla.suse.com/1184171" }, { "category": "self", "summary": "SUSE Bug 1184710", "url": "https://bugzilla.suse.com/1184710" }, { "category": "self", "summary": "SUSE Bug 1184952", "url": "https://bugzilla.suse.com/1184952" }, { "category": "self", "summary": "SUSE Bug 1185847", "url": "https://bugzilla.suse.com/1185847" }, { "category": "self", "summary": "SUSE Bug 1185899", "url": "https://bugzilla.suse.com/1185899" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1186285", "url": "https://bugzilla.suse.com/1186285" }, { "category": "self", "summary": "SUSE Bug 1187052", "url": "https://bugzilla.suse.com/1187052" }, { "category": "self", "summary": "SUSE Bug 1188117", "url": "https://bugzilla.suse.com/1188117" }, { "category": "self", "summary": "SUSE Bug 1188257", "url": "https://bugzilla.suse.com/1188257" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36322 page", "url": "https://www.suse.com/security/cve/CVE-2020-36322/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36385 page", "url": "https://www.suse.com/security/cve/CVE-2020-36385/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-22555 page", "url": "https://www.suse.com/security/cve/CVE-2021-22555/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27363 page", "url": "https://www.suse.com/security/cve/CVE-2021-27363/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27364 page", "url": "https://www.suse.com/security/cve/CVE-2021-27364/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-27365 page", "url": "https://www.suse.com/security/cve/CVE-2021-27365/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28660 page", "url": "https://www.suse.com/security/cve/CVE-2021-28660/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28688 page", "url": "https://www.suse.com/security/cve/CVE-2021-28688/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-29154 page", "url": "https://www.suse.com/security/cve/CVE-2021-29154/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3444 page", "url": "https://www.suse.com/security/cve/CVE-2021-3444/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2)", "tracking": { "current_release_date": "2021-07-30T15:51:38Z", "generator": { "date": "2021-07-30T15:51:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2577-1", "initial_release_date": "2021-07-30T15:51:38Z", "revision_history": [ { "date": "2021-07-30T15:51:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_53_4-preempt-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-36322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36322" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36322", "url": "https://www.suse.com/security/cve/CVE-2020-36322" }, { "category": "external", "summary": "SUSE Bug 1184211 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1184211" }, { "category": "external", "summary": "SUSE Bug 1184952 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1184952" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-36322", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36385" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36385", "url": "https://www.suse.com/security/cve/CVE-2020-36385" }, { "category": "external", "summary": "SUSE Bug 1187050 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1187050" }, { "category": "external", "summary": "SUSE Bug 1187052 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1187052" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196914" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2020-36385" }, { "cve": "CVE-2021-22555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-22555" } ], "notes": [ { "category": "general", "text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-22555", "url": "https://www.suse.com/security/cve/CVE-2021-22555" }, { "category": "external", "summary": "SUSE Bug 1188116 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188116" }, { "category": "external", "summary": "SUSE Bug 1188117 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188117" }, { "category": "external", "summary": "SUSE Bug 1188411 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-22555" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-27363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27363" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27363", "url": "https://www.suse.com/security/cve/CVE-2021-27363" }, { "category": "external", "summary": "SUSE Bug 1182716 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1182716" }, { "category": "external", "summary": "SUSE Bug 1182717 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1182717" }, { "category": "external", "summary": "SUSE Bug 1183120 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1183120" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27363", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-27363" }, { "cve": "CVE-2021-27364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27364" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27364", "url": "https://www.suse.com/security/cve/CVE-2021-27364" }, { "category": "external", "summary": "SUSE Bug 1182715 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182715" }, { "category": "external", "summary": "SUSE Bug 1182716 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182716" }, { "category": "external", "summary": "SUSE Bug 1182717 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1182717" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2021-27364", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-27364" }, { "cve": "CVE-2021-27365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-27365" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-27365", "url": "https://www.suse.com/security/cve/CVE-2021-27365" }, { "category": "external", "summary": "SUSE Bug 1182712 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1182712" }, { "category": "external", "summary": "SUSE Bug 1182715 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1182715" }, { "category": "external", "summary": "SUSE Bug 1183491 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1183491" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2021-27365", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "moderate" } ], "title": "CVE-2021-27365" }, { "cve": "CVE-2021-28660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28660" } ], "notes": [ { "category": "general", "text": "rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -\u003essid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28660", "url": "https://www.suse.com/security/cve/CVE-2021-28660" }, { "category": "external", "summary": "SUSE Bug 1183593 for CVE-2021-28660", "url": "https://bugzilla.suse.com/1183593" }, { "category": "external", "summary": "SUSE Bug 1183658 for CVE-2021-28660", "url": "https://bugzilla.suse.com/1183658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-28660" }, { "cve": "CVE-2021-28688", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28688" } ], "notes": [ { "category": "general", "text": "The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn\u0027t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28688", "url": "https://www.suse.com/security/cve/CVE-2021-28688" }, { "category": "external", "summary": "SUSE Bug 1183646 for CVE-2021-28688", "url": "https://bugzilla.suse.com/1183646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "moderate" } ], "title": "CVE-2021-28688" }, { "cve": "CVE-2021-29154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-29154" } ], "notes": [ { "category": "general", "text": "BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-29154", "url": "https://www.suse.com/security/cve/CVE-2021-29154" }, { "category": "external", "summary": "SUSE Bug 1184391 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184391" }, { "category": "external", "summary": "SUSE Bug 1184710 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1184710" }, { "category": "external", "summary": "SUSE Bug 1186408 for CVE-2021-29154", "url": "https://bugzilla.suse.com/1186408" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "moderate" } ], "title": "CVE-2021-29154" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3444" } ], "notes": [ { "category": "general", "text": "The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 (\"bpf: Fix truncation handling for mod32 dst reg wrt zero\") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3444", "url": "https://www.suse.com/security/cve/CVE-2021-3444" }, { "category": "external", "summary": "SUSE Bug 1184170 for CVE-2021-3444", "url": "https://bugzilla.suse.com/1184170" }, { "category": "external", "summary": "SUSE Bug 1184171 for CVE-2021-3444", "url": "https://bugzilla.suse.com/1184171" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_53_4-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-30T15:51:38Z", "details": "moderate" } ], "title": "CVE-2021-3444" } ] }
suse-su-2021:1899-1
Vulnerability from csaf_suse
Published
2021-06-08 17:29
Modified
2021-06-08 17:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
The following non-security bugs were fixed:
- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- ARM: footbridge: fix PCI interrupt mapping (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- Avoid potentially erroneos RST drop (bsc#1183947).
- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- EDAC/amd64: Gather hardware information early (bsc#1180552).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).
- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- NFSv4: Replace closed stateids with the 'invalid special stateid' (bsc#1185481).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- USB: serial: fix return value for unsupported ioctls (git-fixes).
- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).
- bpf: Fix masking negation logic upon negative dst register (git-fixes).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).
- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: net: fix memory leak in atusb_probe (git-fixes).
- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gianfar: Handle error code at MAC address change (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igb: check timestamp validity (git-fixes).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta->fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (bsc#1112374).
- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mt7601u: fix always true expression (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx4_en: update moderation when config reset (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb->protocol set (bsc#1176081).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).
- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).
- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).
- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nvme-fc: clear q_live at beginning of association teardown (git-fixes).
- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: lewisburg: Update number of pins in community (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).
- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).
- sata_mv: add IRQ checks (git-fixes).
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186452).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).
- soc: qcom: mdt_loader: Validate that p_filesz < p_memsz (git-fixes).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (bsc#1109837).
Patchnames
SUSE-2021-1899,SUSE-SLE-RT-12-SP5-2021-1899
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Avoid potentially erroneos RST drop (bsc#1183947).\n- Do not drop out of segments RST if tcp_be_liberal is set (bsc#1183947).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1899,SUSE-SLE-RT-12-SP5-2021-1899", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1899-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1899-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211899-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1899-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1113431", "url": "https://bugzilla.suse.com/1113431" }, { "category": "self", "summary": "SUSE Bug 1126390", "url": "https://bugzilla.suse.com/1126390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1174682", "url": "https://bugzilla.suse.com/1174682" }, { "category": "self", "summary": "SUSE Bug 1176081", "url": "https://bugzilla.suse.com/1176081" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1180552", "url": "https://bugzilla.suse.com/1180552" }, { "category": "self", "summary": "SUSE Bug 1181383", "url": "https://bugzilla.suse.com/1181383" }, { "category": "self", "summary": "SUSE Bug 1182256", "url": "https://bugzilla.suse.com/1182256" }, { "category": "self", "summary": "SUSE Bug 1183738", "url": "https://bugzilla.suse.com/1183738" }, { "category": "self", "summary": "SUSE Bug 1183947", "url": "https://bugzilla.suse.com/1183947" }, { "category": "self", "summary": "SUSE Bug 1184081", "url": "https://bugzilla.suse.com/1184081" }, { "category": "self", "summary": "SUSE Bug 1184082", "url": "https://bugzilla.suse.com/1184082" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184855", "url": "https://bugzilla.suse.com/1184855" }, { "category": "self", "summary": "SUSE Bug 1185428", "url": "https://bugzilla.suse.com/1185428" }, { "category": "self", "summary": "SUSE Bug 1185481", "url": "https://bugzilla.suse.com/1185481" }, { "category": "self", "summary": "SUSE Bug 1185680", "url": "https://bugzilla.suse.com/1185680" }, { "category": "self", "summary": "SUSE Bug 1185703", "url": "https://bugzilla.suse.com/1185703" }, { "category": "self", "summary": "SUSE Bug 1185724", "url": "https://bugzilla.suse.com/1185724" }, { "category": "self", "summary": "SUSE Bug 1185758", "url": "https://bugzilla.suse.com/1185758" }, { "category": "self", "summary": "SUSE Bug 1185827", "url": "https://bugzilla.suse.com/1185827" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1185906", "url": "https://bugzilla.suse.com/1185906" }, { "category": "self", "summary": "SUSE Bug 1185938", "url": "https://bugzilla.suse.com/1185938" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186111", "url": "https://bugzilla.suse.com/1186111" }, { "category": "self", "summary": "SUSE Bug 1186390", "url": "https://bugzilla.suse.com/1186390" }, { "category": "self", "summary": "SUSE Bug 1186416", "url": "https://bugzilla.suse.com/1186416" }, { "category": "self", "summary": "SUSE Bug 1186439", "url": "https://bugzilla.suse.com/1186439" }, { "category": "self", "summary": "SUSE Bug 1186441", "url": "https://bugzilla.suse.com/1186441" }, { "category": "self", "summary": "SUSE Bug 1186452", "url": "https://bugzilla.suse.com/1186452" }, { "category": "self", "summary": "SUSE Bug 1186460", "url": "https://bugzilla.suse.com/1186460" }, { "category": "self", "summary": "SUSE Bug 1186498", "url": "https://bugzilla.suse.com/1186498" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-06-08T17:29:39Z", "generator": { "date": "2021-06-08T17:29:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1899-1", "initial_release_date": "2021-06-08T17:29:39Z", "revision_history": [ { "date": "2021-06-08T17:29:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.46.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.46.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.46.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.46.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.46.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.46.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.46.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.46.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.46.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.46.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.46.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.46.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T17:29:39Z", "details": "important" } ], "title": "CVE-2021-3491" } ] }
suse-su-2021:1912-1
Vulnerability from csaf_suse
Published
2021-06-09 11:54
Modified
2021-06-09 11:54
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
The following non-security bugs were fixed:
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- kabi: Fix breakage in NVMe driver (bsc#1181161).
- kabi: Fix nvmet error log definitions (bsc#1181161).
- kabi: nvme: fix fast_io_fail_tmo (bsc#1181161).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).
- nvme-fabrics: allow to queue requests for live queues (bsc#1181161).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1181161).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-pci: Sync queues on reset (bsc#1181161).
- nvme-rdma: avoid race between time out and tear down (bsc#1181161).
- nvme-rdma: avoid repeated request completion (bsc#1181161).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-rdma: fix controller reset hang during traffic (bsc#1181161).
- nvme-rdma: fix possible hang when failing to set io queues (bsc#1181161).
- nvme-rdma: fix timeout handler (bsc#1181161).
- nvme-rdma: serialize controller teardown sequences (bsc#1181161).
- nvme-tcp: avoid race between time out and tear down (bsc#1181161).
- nvme-tcp: avoid repeated request completion (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- nvme-tcp: fix controller reset hang during traffic (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- nvme-tcp: fix timeout handler (bsc#1181161).
- nvme-tcp: serialize controller teardown sequences (bsc#1181161).
- nvme: Restart request timers in resetting state (bsc#1181161).
- nvme: add error log page slot definition (bsc#1181161).
- nvme: include admin_q sync with nvme_sync_queues (bsc#1181161).
- nvme: introduce 'Command Aborted By host' status code (bsc#1181161).
- nvme: introduce nvme_is_fabrics to check fabrics cmd (bsc#1181161).
- nvme: introduce nvme_sync_io_queues (bsc#1181161).
- nvme: make fabrics command run on a separate request queue (bsc#1181161).
- nvme: prevent warning triggered by nvme_stop_keep_alive (bsc#1181161).
- nvme: unlink head after removing last namespace (bsc#1181161).
- nvmet: add error log support for fabrics-cmd (bsc#1181161).
- nvmet: add error-log definitions (bsc#1181161).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
Patchnames
SUSE-2021-1912,SUSE-SLE-Module-Live-Patching-15-SP1-2021-1912,SUSE-SLE-Product-HA-15-SP1-2021-1912,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1912,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1912,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1912,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1912,SUSE-Storage-6-2021-1912
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kabi: Fix breakage in NVMe driver (bsc#1181161).\n- kabi: Fix nvmet error log definitions (bsc#1181161).\n- kabi: nvme: fix fast_io_fail_tmo (bsc#1181161).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nvme-fabrics: allow to queue requests for live queues (bsc#1181161).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1181161).\n- nvme-fabrics: reject I/O to offline device (bsc#1181161).\n- nvme-pci: Sync queues on reset (bsc#1181161).\n- nvme-rdma: avoid race between time out and tear down (bsc#1181161).\n- nvme-rdma: avoid repeated request completion (bsc#1181161).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1181161).\n- nvme-rdma: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-rdma: fix timeout handler (bsc#1181161).\n- nvme-rdma: serialize controller teardown sequences (bsc#1181161).\n- nvme-tcp: avoid race between time out and tear down (bsc#1181161).\n- nvme-tcp: avoid repeated request completion (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1181161).\n- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).\n- nvme-tcp: fix timeout handler (bsc#1181161).\n- nvme-tcp: serialize controller teardown sequences (bsc#1181161).\n- nvme: Restart request timers in resetting state (bsc#1181161).\n- nvme: add error log page slot definition (bsc#1181161).\n- nvme: include admin_q sync with nvme_sync_queues (bsc#1181161).\n- nvme: introduce \u0027Command Aborted By host\u0027 status code (bsc#1181161).\n- nvme: introduce nvme_is_fabrics to check fabrics cmd (bsc#1181161).\n- nvme: introduce nvme_sync_io_queues (bsc#1181161).\n- nvme: make fabrics command run on a separate request queue (bsc#1181161).\n- nvme: prevent warning triggered by nvme_stop_keep_alive (bsc#1181161).\n- nvme: unlink head after removing last namespace (bsc#1181161).\n- nvmet: add error log support for fabrics-cmd (bsc#1181161).\n- nvmet: add error-log definitions (bsc#1181161).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1912,SUSE-SLE-Module-Live-Patching-15-SP1-2021-1912,SUSE-SLE-Product-HA-15-SP1-2021-1912,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1912,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1912,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1912,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1912,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1912,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1912,SUSE-Storage-6-2021-1912", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1912-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1912-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211912-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1912-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" }, { "category": "self", "summary": "SUSE Bug 1181161", "url": "https://bugzilla.suse.com/1181161" }, { "category": "self", "summary": "SUSE Bug 1183405", "url": "https://bugzilla.suse.com/1183405" }, { "category": "self", "summary": "SUSE Bug 1183738", "url": "https://bugzilla.suse.com/1183738" }, { "category": "self", "summary": "SUSE Bug 1183947", "url": "https://bugzilla.suse.com/1183947" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184675", "url": "https://bugzilla.suse.com/1184675" }, { "category": "self", "summary": "SUSE Bug 1185642", "url": "https://bugzilla.suse.com/1185642" }, { "category": "self", "summary": "SUSE Bug 1185680", "url": "https://bugzilla.suse.com/1185680" }, { "category": "self", "summary": "SUSE Bug 1185725", "url": "https://bugzilla.suse.com/1185725" }, { "category": "self", "summary": "SUSE Bug 1185859", "url": "https://bugzilla.suse.com/1185859" }, { "category": "self", "summary": "SUSE Bug 1185860", "url": "https://bugzilla.suse.com/1185860" }, { "category": "self", "summary": "SUSE Bug 1185862", "url": "https://bugzilla.suse.com/1185862" }, { "category": "self", "summary": "SUSE Bug 1185863", "url": "https://bugzilla.suse.com/1185863" }, { "category": "self", "summary": "SUSE Bug 1185898", "url": "https://bugzilla.suse.com/1185898" }, { "category": "self", "summary": "SUSE Bug 1185899", "url": "https://bugzilla.suse.com/1185899" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1185938", "url": "https://bugzilla.suse.com/1185938" }, { "category": "self", "summary": "SUSE Bug 1185950", "url": "https://bugzilla.suse.com/1185950" }, { "category": "self", "summary": "SUSE Bug 1185987", "url": "https://bugzilla.suse.com/1185987" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186061", "url": "https://bugzilla.suse.com/1186061" }, { "category": "self", "summary": "SUSE Bug 1186062", "url": "https://bugzilla.suse.com/1186062" }, { "category": "self", "summary": "SUSE Bug 1186111", "url": "https://bugzilla.suse.com/1186111" }, { "category": "self", "summary": "SUSE Bug 1186285", "url": "https://bugzilla.suse.com/1186285" }, { "category": "self", "summary": "SUSE Bug 1186390", "url": "https://bugzilla.suse.com/1186390" }, { "category": "self", "summary": "SUSE Bug 1186484", "url": "https://bugzilla.suse.com/1186484" }, { "category": "self", "summary": "SUSE Bug 1186498", "url": "https://bugzilla.suse.com/1186498" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-06-09T11:54:48Z", "generator": { "date": "2021-06-09T11:54:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1912-1", "initial_release_date": "2021-06-09T11:54:48Z", "revision_history": [ { "date": "2021-06-09T11:54:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.92.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.92.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.92.1.aarch64", "product_id": "kernel-syms-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.92.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.92.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.92.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.92.1.noarch", "product_id": "kernel-devel-4.12.14-197.92.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.92.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.92.1.noarch", "product_id": "kernel-docs-4.12.14-197.92.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.92.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.92.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.92.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.92.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.92.1.noarch", "product_id": "kernel-macros-4.12.14-197.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.92.1.noarch", "product": { "name": "kernel-source-4.12.14-197.92.1.noarch", "product_id": "kernel-source-4.12.14-197.92.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.92.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.92.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.92.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.92.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.92.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.92.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.92.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.92.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.92.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.92.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.92.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-4.12.14-197.92.1.s390x", "product_id": "kernel-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.92.1.s390x", "product_id": "kernel-default-base-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.92.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.92.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.92.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.92.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.92.1.s390x", "product_id": "kernel-default-man-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.92.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.92.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.92.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.92.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.92.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.92.1.s390x", "product_id": "kernel-syms-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.92.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.92.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.92.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.92.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.92.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.92.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.92.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.92.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.92.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.92.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.92.1.x86_64", "product_id": "kernel-debug-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.92.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.92.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.92.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.92.1.x86_64", "product_id": "kernel-syms-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.92.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.92.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.0", "product": { "name": "SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.0", "product": { "name": "SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.0", "product": { "name": "SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.92.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.92.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.92.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_92-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.92.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.92.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.92.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:54:48Z", "details": "important" } ], "title": "CVE-2021-3491" } ] }
suse-su-2021:2332-1
Vulnerability from csaf_suse
Published
2021-07-14 15:09
Modified
2021-07-14 15:09
Summary
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-197_56 fixes several issues.
The following security issues were fixed:
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2332,SUSE-SLE-Live-Patching-12-SP5-2021-2339,SUSE-SLE-Live-Patching-12-SP5-2021-2345,SUSE-SLE-Live-Patching-12-SP5-2021-2346,SUSE-SLE-Live-Patching-12-SP5-2021-2347,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2328,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2329,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2330,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2331,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2332,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2333
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-197_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2332,SUSE-SLE-Live-Patching-12-SP5-2021-2339,SUSE-SLE-Live-Patching-12-SP5-2021-2345,SUSE-SLE-Live-Patching-12-SP5-2021-2346,SUSE-SLE-Live-Patching-12-SP5-2021-2347,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2328,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2329,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2330,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2331,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2332,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2333", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2332-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2332-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212332-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2332-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009134.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP1)", "tracking": { "current_release_date": "2021-07-14T15:09:09Z", "generator": { "date": "2021-07-14T15:09:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2332-1", "initial_release_date": "2021-07-14T15:09:09Z", "revision_history": [ { "date": "2021-07-14T15:09:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T15:09:09Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_37-default-13-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_41-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_56-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_61-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_64-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_67-default-9-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_72-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T15:09:09Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2366-1
Vulnerability from csaf_suse
Published
2021-07-15 13:22
Modified
2021-07-15 13:22
Summary
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_61 fixes one issue.
The following security issue was fixed:
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2366,SUSE-SLE-Live-Patching-12-SP5-2021-2369,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2366,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2373
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_61 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2366,SUSE-SLE-Live-Patching-12-SP5-2021-2369,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2366,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2373", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2366-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2366-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212366-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2366-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009144.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2)", "tracking": { "current_release_date": "2021-07-15T13:22:44Z", "generator": { "date": "2021-07-15T13:22:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2366-1", "initial_release_date": "2021-07-15T13:22:44Z", "revision_history": [ { "date": "2021-07-15T13:22:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_71-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_52-preempt-6-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_52-preempt-6-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_52-preempt-6-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_71-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_52-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_61-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:22:44Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2460-1
Vulnerability from csaf_suse
Published
2021-07-23 06:58
Modified
2021-07-23 06:58
Summary
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_66 fixes one issue.
The following security issue was fixed:
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2460,SUSE-SLE-Live-Patching-12-SP5-2021-2460
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_66 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2460,SUSE-SLE-Live-Patching-12-SP5-2021-2460", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2460-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2460-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212460-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2460-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009209.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP5)", "tracking": { "current_release_date": "2021-07-23T06:58:54Z", "generator": { "date": "2021-07-23T06:58:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2460-1", "initial_release_date": "2021-07-23T06:58:54Z", "revision_history": [ { "date": "2021-07-23T06:58:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_66-default-4-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_66-default-4-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-23T06:58:54Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:1891-1
Vulnerability from csaf_suse
Published
2021-06-08 13:09
Modified
2021-06-08 13:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
The following non-security bugs were fixed:
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb->protocol set (bsc#1176081).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
Patchnames
SUSE-2021-1891,SUSE-OpenStack-Cloud-9-2021-1891,SUSE-OpenStack-Cloud-Crowbar-9-2021-1891,SUSE-SLE-HA-12-SP4-2021-1891,SUSE-SLE-Live-Patching-12-SP4-2021-1891,SUSE-SLE-SAP-12-SP4-2021-1891,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1891
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).\n- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).\n- kernel/smp: add more data to CSD lock debugging (bsc#1180846).\n- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846).\n- kernel/smp: prepare more CSD lock debugging (bsc#1180846).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1891,SUSE-OpenStack-Cloud-9-2021-1891,SUSE-OpenStack-Cloud-Crowbar-9-2021-1891,SUSE-SLE-HA-12-SP4-2021-1891,SUSE-SLE-Live-Patching-12-SP4-2021-1891,SUSE-SLE-SAP-12-SP4-2021-1891,SUSE-SLE-SERVER-12-SP4-LTSS-2021-1891", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1891-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1891-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211891-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1891-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" }, { "category": "self", "summary": "SUSE Bug 1176081", "url": "https://bugzilla.suse.com/1176081" }, { "category": "self", "summary": "SUSE Bug 1180846", "url": "https://bugzilla.suse.com/1180846" }, { "category": "self", "summary": "SUSE Bug 1183947", "url": "https://bugzilla.suse.com/1183947" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184675", "url": "https://bugzilla.suse.com/1184675" }, { "category": "self", "summary": "SUSE Bug 1185642", "url": "https://bugzilla.suse.com/1185642" }, { "category": "self", "summary": "SUSE Bug 1185677", "url": "https://bugzilla.suse.com/1185677" }, { "category": "self", "summary": "SUSE Bug 1185680", "url": "https://bugzilla.suse.com/1185680" }, { "category": "self", "summary": "SUSE Bug 1185724", "url": "https://bugzilla.suse.com/1185724" }, { "category": "self", "summary": "SUSE Bug 1185859", "url": "https://bugzilla.suse.com/1185859" }, { "category": "self", "summary": "SUSE Bug 1185860", "url": "https://bugzilla.suse.com/1185860" }, { "category": "self", "summary": "SUSE Bug 1185862", "url": "https://bugzilla.suse.com/1185862" }, { "category": "self", "summary": "SUSE Bug 1185863", "url": "https://bugzilla.suse.com/1185863" }, { "category": "self", "summary": "SUSE Bug 1185898", "url": "https://bugzilla.suse.com/1185898" }, { "category": "self", "summary": "SUSE Bug 1185899", "url": "https://bugzilla.suse.com/1185899" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1185938", "url": "https://bugzilla.suse.com/1185938" }, { "category": "self", "summary": "SUSE Bug 1185950", "url": "https://bugzilla.suse.com/1185950" }, { "category": "self", "summary": "SUSE Bug 1185987", "url": "https://bugzilla.suse.com/1185987" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186061", "url": "https://bugzilla.suse.com/1186061" }, { "category": "self", "summary": "SUSE Bug 1186062", "url": "https://bugzilla.suse.com/1186062" }, { "category": "self", "summary": "SUSE Bug 1186111", "url": "https://bugzilla.suse.com/1186111" }, { "category": "self", "summary": "SUSE Bug 1186285", "url": "https://bugzilla.suse.com/1186285" }, { "category": "self", "summary": "SUSE Bug 1186390", "url": "https://bugzilla.suse.com/1186390" }, { "category": "self", "summary": "SUSE Bug 1186484", "url": "https://bugzilla.suse.com/1186484" }, { "category": "self", "summary": "SUSE Bug 1186498", "url": "https://bugzilla.suse.com/1186498" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-06-08T13:09:12Z", "generator": { "date": "2021-06-08T13:09:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1891-1", "initial_release_date": "2021-06-08T13:09:12Z", "revision_history": [ { "date": "2021-06-08T13:09:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.77.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.77.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.77.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.77.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.77.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.77.1.aarch64", "product_id": "kernel-syms-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.77.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.77.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.77.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.77.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.77.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.77.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.77.1.noarch", "product_id": "kernel-devel-4.12.14-95.77.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.77.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.77.1.noarch", "product_id": "kernel-docs-4.12.14-95.77.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.77.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.77.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.77.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.77.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.77.1.noarch", "product_id": "kernel-macros-4.12.14-95.77.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.77.1.noarch", "product": { "name": "kernel-source-4.12.14-95.77.1.noarch", "product_id": "kernel-source-4.12.14-95.77.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.77.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.77.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.77.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.77.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.77.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.77.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.77.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.77.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.77.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.77.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.77.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.77.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.77.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.77.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-4.12.14-95.77.1.s390x", "product_id": "kernel-default-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.77.1.s390x", "product_id": "kernel-default-base-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.77.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.77.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.77.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.77.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.77.1.s390x", "product_id": "kernel-default-man-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.77.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.77.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.77.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.77.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.77.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.77.1.s390x", "product_id": "kernel-syms-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.77.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.77.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.77.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.77.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.77.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.77.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.77.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.77.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.77.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.77.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.77.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.77.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.77.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.77.1.x86_64", "product_id": "kernel-debug-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.77.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.77.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.77.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.77.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.77.1.x86_64", "product_id": "kernel-syms-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.77.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.77.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.77.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.77.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.77.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.77.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.77.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.77.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.77.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.77.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_77-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.77.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.77.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.77.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-08T13:09:12Z", "details": "important" } ], "title": "CVE-2021-3491" } ] }
suse-su-2021:2367-1
Vulnerability from csaf_suse
Published
2021-07-15 13:22
Modified
2021-07-15 13:22
Summary
Security update for the Linux Kernel (Live Patch 24 for SLE 15)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 24 for SLE 15)
Description of the patch
This update for the Linux Kernel 4.12.14-150_72 fixes several issues.
The following security issues were fixed:
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2367,SUSE-SLE-Live-Patching-12-SP4-2021-2355,SUSE-SLE-Live-Patching-12-SP4-2021-2356,SUSE-SLE-Live-Patching-12-SP4-2021-2367,SUSE-SLE-Module-Live-Patching-15-2021-2364,SUSE-SLE-Module-Live-Patching-15-2021-2370
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 15)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150_72 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2367,SUSE-SLE-Live-Patching-12-SP4-2021-2355,SUSE-SLE-Live-Patching-12-SP4-2021-2356,SUSE-SLE-Live-Patching-12-SP4-2021-2367,SUSE-SLE-Module-Live-Patching-15-2021-2364,SUSE-SLE-Module-Live-Patching-15-2021-2370", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2367-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2367-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212367-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2367-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE Bug 1187687", "url": "https://bugzilla.suse.com/1187687" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0605 page", "url": "https://www.suse.com/security/cve/CVE-2021-0605/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 15)", "tracking": { "current_release_date": "2021-07-15T13:22:14Z", "generator": { "date": "2021-07-15T13:22:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2367-1", "initial_release_date": "2021-07-15T13:22:14Z", "revision_history": [ { "date": "2021-07-15T13:22:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:22:14Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0605" } ], "notes": [ { "category": "general", "text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0605", "url": "https://www.suse.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "SUSE Bug 1187601 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187601" }, { "category": "external", "summary": "SUSE Bug 1187687 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187687" }, { "category": "external", "summary": "SUSE Bug 1188381 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1188381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:22:14Z", "details": "important" } ], "title": "CVE-2021-0605" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-12-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_60-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_74-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_69-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_72-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:22:14Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:1913-1
Vulnerability from csaf_suse
Published
2021-06-09 11:55
Modified
2021-06-09 11:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
The following non-security bugs were fixed:
- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- ARM: footbridge: fix PCI interrupt mapping (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- EDAC/amd64: Gather hardware information early (bsc#1180552).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).
- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- NFSv4: Replace closed stateids with the 'invalid special stateid' (bsc#1185481).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: fix return value for unsupported ioctls (git-fixes).
- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).
- bpf: Fix masking negation logic upon negative dst register (git-fixes).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).
- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).
- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: net: fix memory leak in atusb_probe (git-fixes).
- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gianfar: Handle error code at MAC address change (git-fixes).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igb: check timestamp validity (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta->fast_rx when STA removed from 4-addr VLAN (git-fixes).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (bsc#1112374).
- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).
- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mt7601u: fix always true expression (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx4_en: update moderation when config reset (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb->protocol set (bsc#1176081).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).
- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).
- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).
- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nvme-fc: clear q_live at beginning of association teardown (git-fixes).
- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: lewisburg: Update number of pins in community (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).
- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).
- sata_mv: add IRQ checks (git-fixes).
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186452).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).
- soc: qcom: mdt_loader: Validate that p_filesz < p_memsz (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (bsc#1109837).
Patchnames
SUSE-2021-1913,SUSE-SLE-HA-12-SP5-2021-1913,SUSE-SLE-Live-Patching-12-SP5-2021-1913,SUSE-SLE-SDK-12-SP5-2021-1913,SUSE-SLE-SERVER-12-SP5-2021-1913,SUSE-SLE-WE-12-SP5-2021-1913
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)\n- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)\n- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).\n- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)\n- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)\n- CVE-2021-23133: Fixed a race condition in SCTP sockets, which could lead to privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)\n\nThe following non-security bugs were fixed:\n\n- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).\n- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).\n- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).\n- ACPI: custom_method: fix a possible memory leak (git-fixes).\n- ACPI: custom_method: fix potential use-after-free issue (git-fixes).\n- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).\n- ALSA: aloop: Fix initialization of controls (git-fixes).\n- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).\n- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).\n- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).\n- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).\n- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).\n- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).\n- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).\n- ALSA: hdsp: do not disable if not enabled (git-fixes).\n- ALSA: hdspm: do not disable if not enabled (git-fixes).\n- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).\n- ALSA: rme9652: do not disable if not enabled (git-fixes).\n- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).\n- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).\n- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).\n- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).\n- ARM: footbridge: fix PCI interrupt mapping (git-fixes).\n- ASoC: cs35l33: fix an error code in probe() (git-fixes).\n- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).\n- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).\n- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).\n- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).\n- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).\n- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).\n- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).\n- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).\n- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185724).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185724).\n- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).\n- EDAC/amd64: Gather hardware information early (bsc#1180552).\n- EDAC/amd64: Make struct amd64_family_type global (bsc#1180552).\n- EDAC/amd64: Save max number of controllers to family type (bsc#1180552).\n- HID: alps: fix error return code in alps_input_configured() (git-fixes).\n- HID: plantronics: Workaround for double volume key presses (git-fixes).\n- HID: wacom: Assign boolean values to a bool variable (git-fixes).\n- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).\n- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).\n- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).\n- Input: nspire-keypad - enable interrupts only when opened (git-fixes).\n- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).\n- KVM: s390: fix guarded storage control register handling (bsc#1133021).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).\n- NFSv4: Replace closed stateids with the \u0027invalid special stateid\u0027 (bsc#1185481).\n- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).\n- PCI: Release OF node in pci_scan_device()\u0027s error path (git-fixes).\n- RDMA/hns: Delete redundant condition judgment related to eq (bsc#1104427).\n- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (bsc#1103992).\n- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).\n- SUNRPC: More fixes for backlog congestion (bsc#1185428).\n- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).\n- USB: Add reset-resume quirk for WD19\u0027s Realtek Hub (git-fixes).\n- USB: serial: fix return value for unsupported ioctls (git-fixes).\n- USB: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).\n- USB: trancevibrator: fix control-request direction (git-fixes).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- ata: libahci_platform: fix IRQ check (git-fixes).\n- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).\n- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).\n- bnxt_en: Fix PCI AER error recovery flow (git-fixes).\n- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (bsc#1104745).\n- bpf: Fix masking negation logic upon negative dst register (git-fixes).\n- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).\n- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).\n- bus: qcom: Put child node before return (git-fixes).\n- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).\n- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).\n- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).\n- clk: fix invalid usage of list cursor in register (git-fixes).\n- clk: fix invalid usage of list cursor in unregister (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).\n- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).\n- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).\n- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).\n- clk: uniphier: Fix potential infinite loop (git-fixes).\n- cpufreq: Add NULL checks to show() and store() methods of cpufreq (bsc#1184040).\n- cpufreq: Avoid cpufreq_suspend() deadlock on system shutdown (bsc#1184040).\n- cpufreq: Kconfig: fix documentation links (git-fixes).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).\n- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).\n- crypto: qat - Fix a double free in adf_create_ring (git-fixes).\n- crypto: qat - do not release uninitialized resources (git-fixes).\n- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).\n- cxgb4: Fix unintentional sign extension issues (bsc#1064802 bsc#1066129).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).\n- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).\n- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).\n- drivers: net: fix memory leak in atusb_probe (git-fixes).\n- drivers: net: fix memory leak in peak_usb_create_dev (git-fixes).\n- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).\n- drm/amdgpu: fix NULL pointer dereference (git-fixes).\n- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).\n- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).\n- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).\n- drm/meson: fix shutdown crash when component not probed (git-fixes).\n- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).\n- drm/omap: fix misleading indentation in pixinc() (git-fixes).\n- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).\n- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).\n- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).\n- e1000e: Fix duplicate include guard (git-fixes).\n- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).\n- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).\n- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (bsc#1113431).\n- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).\n- fbdev: zero-fill colormap in fbcmap.c (git-fixes).\n- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).\n- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).\n- gianfar: Handle error code at MAC address change (git-fixes).\n- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).\n- i2c: cadence: add IRQ check (git-fixes).\n- i2c: emev2: add IRQ check (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).\n- i2c: jz4780: add IRQ check (git-fixes).\n- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).\n- i2c: sh7760: add IRQ check (git-fixes).\n- i2c: sh7760: fix IRQ error path (git-fixes).\n- i40e: Added Asym_Pause to supported link modes (git-fixes).\n- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (jsc#SLE-4797).\n- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).\n- i40e: Fix use-after-free in i40e_client_subtask() (bsc#1101816 ).\n- i40e: fix broken XDP support (git-fixes).\n- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).\n- i40e: fix the restart auto-negotiation after FEC modified (jsc#SLE-4797).\n- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).\n- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).\n- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).\n- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).\n- igb: Fix duplicate include guard (git-fixes).\n- igb: check timestamp validity (git-fixes).\n- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).\n- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).\n- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).\n- iio: tsl2583: Fix division by a zero lux_val (git-fixes).\n- intel_th: Consistency and off-by-one fix (git-fixes).\n- ipmi/watchdog: Stop watchdog timer when the current action is \u0027none\u0027 (bsc#1184855).\n- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).\n- kABI: powerpc/64: add back start_tb and accum_tb to thread_struct.\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).\n- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).\n- mac80211: bail out if cipher schemes are invalid (git-fixes).\n- mac80211: clear sta-\u003efast_rx when STA removed from 4-addr VLAN (git-fixes).\n- mac80211: clear the beacon\u0027s CRC after channel switch (git-fixes).\n- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).\n- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).\n- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).\n- md: do not flush workqueue unconditionally in md_open (bsc#1184081).\n- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).\n- md: md_open returns -EBUSY when entering racing area (bsc#1184081).\n- md: split mddev_find (bsc#1184081).\n- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).\n- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).\n- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).\n- media: em28xx: fix memory leak (git-fixes).\n- media: gspca/sq905.c: fix uninitialized variable (git-fixes).\n- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).\n- media: ite-cir: check for receive overflow (git-fixes).\n- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).\n- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).\n- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).\n- mfd: lpc_sch: Partially revert \u0027Add support for Intel Quark X1000\u0027 (git-fixes).\n- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).\n- misc/uss720: fix memory leak in uss720_probe (git-fixes).\n- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).\n- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).\n- mlxsw: spectrum_mr: Update egress RIF list before route\u0027s action (bsc#1112374).\n- mm: mempolicy: fix potential pte_unmap_unlock pte error (bsc#1185906).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bsc#1185906).\n- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).\n- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).\n- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).\n- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).\n- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).\n- mt7601u: fix always true expression (git-fixes).\n- mtd: require write permissions for locking and badblock ioctls (git-fixes).\n- net, xdp: Update pkt_type if generic XDP changes unicast MAC (bsc#1109837).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx4_en: update moderation when config reset (git-fixes).\n- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- net: enic: Cure the enic api locking trainwreck (git-fixes).\n- net: hns3: Fix for geneve tx checksum bug (bsc#1104353 ).\n- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (bsc#1104353).\n- net: hns3: disable phy loopback setting in hclge_mac_start_phy (bsc#1104353).\n- net: hns3: fix for vxlan gpe tx checksum bug (bsc#1104353 ).\n- net: hns3: fix incorrect configuration for igu_egu_hw_err (bsc#1104353).\n- net: hns3: initialize the message content in hclge_get_link_mode() (bsc#1126390).\n- net: hns3: use netif_tx_disable to stop the transmit queue (bsc#1104353).\n- net: phy: intel-xway: enable integrated led functions (git-fixes).\n- net: qed: RDMA personality shouldn\u0027t fail VF load (git-fixes).\n- net: thunderx: Fix unintentional sign extension issue (git-fixes).\n- net: usb: fix memory leak in smsc75xx_bind (git-fixes).\n- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).\n- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: avoid misleading \u0027invalid\u0027 in log message (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).\n- netfilter: conntrack: tcp: only close if RST matches exact sequence (bsc#1183947 bsc#1185950).\n- nfc: pn533: prevent potential memory corruption (git-fixes).\n- nvme-fc: clear q_live at beginning of association teardown (git-fixes).\n- nvme-loop: Introduce no merge flag for biovec (bsc#1174682).\n- pata_arasan_cf: fix IRQ check (git-fixes).\n- pata_ipx4xx_cf: fix IRQ check (git-fixes).\n- pcnet32: Use pci_resource_len to validate PCI resource (git-fixes).\n- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).\n- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).\n- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).\n- pinctrl: lewisburg: Update number of pins in community (git-fixes).\n- pinctrl: samsung: use \u0027int\u0027 for register masks in Exynos (git-fixes).\n- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).\n- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).\n- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).\n- power: supply: Use IRQF_ONESHOT (git-fixes).\n- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).\n- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).\n- powerpc/64: remove start_tb and accum_tb from thread_struct (bsc#1186487 ltc#177613).\n- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).\n- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).\n- powerpc/pseries: lparcfg calculate PURR on demand (bsc#1186487 ltc#177613).\n- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).\n- rsxx: remove extraneous \u0027const\u0027 qualifier (git-fixes).\n- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).\n- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).\n- s390/dasd: fix hanging DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/dasd: fix hanging IO request during DASD driver unbind (bsc#1183754 LTC#192081).\n- s390/entry: save the caller of psw_idle (bsc#1185677).\n- s390/kdump: fix out-of-memory with PCI (bsc#1182256 LTC#191375).\n- sata_mv: add IRQ checks (git-fixes).\n- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).\n- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).\n- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186452).\n- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186452).\n- scsi: lpfc: Fix \u0027Unexpected timeout\u0027 error in direct attach topology (bsc#1186452).\n- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186452).\n- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186452).\n- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186452).\n- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186452).\n- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186452).\n- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186452).\n- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186452).\n- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186452).\n- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186452).\n- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).\n- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).\n- serial: stm32: fix incorrect characters on console (git-fixes).\n- smc: disallow TCP_ULP in smc_setsockopt() (bsc#1109837).\n- soc: qcom: mdt_loader: Validate that p_filesz \u0026lt; p_memsz (git-fixes).\n- spi: dln2: Fix reference leak to master (git-fixes).\n- spi: omap-100k: Fix reference leak to master (git-fixes).\n- spi: spi-ti-qspi: Free DMA resources (git-fixes).\n- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).\n- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).\n- staging: rtl8192u: Fix potential infinite loop (git-fixes).\n- tcp: fix to update snd_wl1 in bulk receiver fast path (bsc#1185827).\n- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable \u0027val\u0027 (git-fixes).\n- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).\n- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).\n- tracing: Map all PIDs to command lines (git-fixes).\n- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).\n- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).\n- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).\n- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).\n- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).\n- usb: dwc3: omap: improve extcon initialization (git-fixes).\n- usb: fotg210-hcd: Fix an error message (git-fixes).\n- usb: sl811-hcd: improve misleading indentation (git-fixes).\n- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).\n- usb: xhci: Fix port minor revision (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- usb: xhci: Increase timeout for HC halt (git-fixes).\n- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185724).\n- vsock/vmci: log once the failed queue pair allocation (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).\n- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).\n- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).\n- xsk: Respect device\u0027s headroom and tailroom on generic xmit path (bsc#1109837).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-1913,SUSE-SLE-HA-12-SP5-2021-1913,SUSE-SLE-Live-Patching-12-SP5-2021-1913,SUSE-SLE-SDK-12-SP5-2021-1913,SUSE-SLE-SERVER-12-SP5-2021-1913,SUSE-SLE-WE-12-SP5-2021-1913", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_1913-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:1913-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20211913-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:1913-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1101816", "url": "https://bugzilla.suse.com/1101816" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113431", "url": "https://bugzilla.suse.com/1113431" }, { "category": "self", "summary": "SUSE Bug 1126390", "url": "https://bugzilla.suse.com/1126390" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1174682", "url": "https://bugzilla.suse.com/1174682" }, { "category": "self", "summary": "SUSE Bug 1176081", "url": "https://bugzilla.suse.com/1176081" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1180552", "url": "https://bugzilla.suse.com/1180552" }, { "category": "self", "summary": "SUSE Bug 1181383", "url": "https://bugzilla.suse.com/1181383" }, { "category": "self", "summary": "SUSE Bug 1182256", "url": "https://bugzilla.suse.com/1182256" }, { "category": "self", "summary": "SUSE Bug 1183738", "url": "https://bugzilla.suse.com/1183738" }, { "category": "self", "summary": "SUSE Bug 1183754", "url": "https://bugzilla.suse.com/1183754" }, { "category": "self", "summary": "SUSE Bug 1183947", "url": "https://bugzilla.suse.com/1183947" }, { "category": "self", "summary": "SUSE Bug 1184040", "url": "https://bugzilla.suse.com/1184040" }, { "category": "self", "summary": "SUSE Bug 1184081", "url": "https://bugzilla.suse.com/1184081" }, { "category": "self", "summary": "SUSE Bug 1184082", "url": "https://bugzilla.suse.com/1184082" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184675", "url": "https://bugzilla.suse.com/1184675" }, { "category": "self", "summary": "SUSE Bug 1184855", "url": "https://bugzilla.suse.com/1184855" }, { "category": "self", "summary": "SUSE Bug 1185428", "url": "https://bugzilla.suse.com/1185428" }, { "category": "self", "summary": "SUSE Bug 1185481", "url": "https://bugzilla.suse.com/1185481" }, { "category": "self", "summary": "SUSE Bug 1185642", "url": "https://bugzilla.suse.com/1185642" }, { "category": "self", "summary": "SUSE Bug 1185677", "url": "https://bugzilla.suse.com/1185677" }, { "category": "self", "summary": "SUSE Bug 1185680", "url": "https://bugzilla.suse.com/1185680" }, { "category": "self", "summary": "SUSE Bug 1185703", "url": "https://bugzilla.suse.com/1185703" }, { "category": "self", "summary": "SUSE Bug 1185724", "url": "https://bugzilla.suse.com/1185724" }, { "category": "self", "summary": "SUSE Bug 1185758", "url": "https://bugzilla.suse.com/1185758" }, { "category": "self", "summary": "SUSE Bug 1185827", "url": "https://bugzilla.suse.com/1185827" }, { "category": "self", "summary": "SUSE Bug 1185859", "url": "https://bugzilla.suse.com/1185859" }, { "category": "self", "summary": "SUSE Bug 1185860", "url": "https://bugzilla.suse.com/1185860" }, { "category": "self", "summary": "SUSE Bug 1185862", "url": "https://bugzilla.suse.com/1185862" }, { "category": "self", "summary": "SUSE Bug 1185863", "url": "https://bugzilla.suse.com/1185863" }, { "category": "self", "summary": "SUSE Bug 1185898", "url": "https://bugzilla.suse.com/1185898" }, { "category": "self", "summary": "SUSE Bug 1185899", "url": "https://bugzilla.suse.com/1185899" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1185906", "url": "https://bugzilla.suse.com/1185906" }, { "category": "self", "summary": "SUSE Bug 1185938", "url": "https://bugzilla.suse.com/1185938" }, { "category": "self", "summary": "SUSE Bug 1185950", "url": "https://bugzilla.suse.com/1185950" }, { "category": "self", "summary": "SUSE Bug 1185987", "url": "https://bugzilla.suse.com/1185987" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186061", "url": "https://bugzilla.suse.com/1186061" }, { "category": "self", "summary": "SUSE Bug 1186062", "url": "https://bugzilla.suse.com/1186062" }, { "category": "self", "summary": "SUSE Bug 1186111", "url": "https://bugzilla.suse.com/1186111" }, { "category": "self", "summary": "SUSE Bug 1186285", "url": "https://bugzilla.suse.com/1186285" }, { "category": "self", "summary": "SUSE Bug 1186390", "url": "https://bugzilla.suse.com/1186390" }, { "category": "self", "summary": "SUSE Bug 1186416", "url": "https://bugzilla.suse.com/1186416" }, { "category": "self", "summary": "SUSE Bug 1186439", "url": "https://bugzilla.suse.com/1186439" }, { "category": "self", "summary": "SUSE Bug 1186441", "url": "https://bugzilla.suse.com/1186441" }, { "category": "self", "summary": "SUSE Bug 1186452", "url": "https://bugzilla.suse.com/1186452" }, { "category": "self", "summary": "SUSE Bug 1186460", "url": "https://bugzilla.suse.com/1186460" }, { "category": "self", "summary": "SUSE Bug 1186484", "url": "https://bugzilla.suse.com/1186484" }, { "category": "self", "summary": "SUSE Bug 1186487", "url": "https://bugzilla.suse.com/1186487" }, { "category": "self", "summary": "SUSE Bug 1186498", "url": "https://bugzilla.suse.com/1186498" }, { "category": "self", "summary": "SUSE Bug 1186573", "url": "https://bugzilla.suse.com/1186573" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-06-09T11:55:09Z", "generator": { "date": "2021-06-09T11:55:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:1913-1", "initial_release_date": "2021-06-09T11:55:09Z", "revision_history": [ { "date": "2021-06-09T11:55:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.74.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.74.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.74.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.74.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.74.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.74.1.aarch64", "product_id": "kernel-syms-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.74.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.74.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.74.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.74.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.74.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.74.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.74.1.noarch", "product_id": "kernel-devel-4.12.14-122.74.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.74.2.noarch", "product": { "name": "kernel-docs-4.12.14-122.74.2.noarch", "product_id": "kernel-docs-4.12.14-122.74.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.74.2.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.74.2.noarch", "product_id": "kernel-docs-html-4.12.14-122.74.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.74.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.74.1.noarch", "product_id": "kernel-macros-4.12.14-122.74.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.74.1.noarch", "product": { "name": "kernel-source-4.12.14-122.74.1.noarch", "product_id": "kernel-source-4.12.14-122.74.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.74.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.74.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.74.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.74.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.74.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.74.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.74.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.74.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.74.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.74.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.74.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.74.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.74.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.74.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-4.12.14-122.74.1.s390x", "product_id": "kernel-default-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.74.1.s390x", "product_id": "kernel-default-base-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.74.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.74.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.74.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.74.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.74.1.s390x", "product_id": "kernel-default-man-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.74.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.74.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.74.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.74.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.74.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.74.1.s390x", "product_id": "kernel-syms-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.74.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.74.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.74.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.74.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.74.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.74.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.74.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.74.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.74.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.74.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.74.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.74.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.74.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.74.1.x86_64", "product_id": "kernel-debug-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.74.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.74.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.74.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.74.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.74.1.x86_64", "product_id": "kernel-syms-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.74.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.74.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.74.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.74.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.74.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch" }, "product_reference": "kernel-docs-4.12.14-122.74.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.74.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.74.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.74.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.74.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.74.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.74.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_74-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.74.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.74.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.74.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-06-09T11:55:09Z", "details": "important" } ], "title": "CVE-2021-3491" } ] }
suse-su-2021:2361-1
Vulnerability from csaf_suse
Published
2021-07-15 13:20
Modified
2021-07-15 13:20
Summary
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.
The following security issues were fixed:
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2361,SUSE-SLE-Live-Patching-12-SP5-2021-2357,SUSE-SLE-Live-Patching-12-SP5-2021-2358,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2359,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2360,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2365,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2371,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2361,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2362,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_49 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2361,SUSE-SLE-Live-Patching-12-SP5-2021-2357,SUSE-SLE-Live-Patching-12-SP5-2021-2358,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2359,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2360,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2365,SUSE-SLE-Module-Live-Patching-15-SP1-2021-2371,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2361,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2362,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2363", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2361-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2361-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212361-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2361-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009148.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2)", "tracking": { "current_release_date": "2021-07-15T13:20:52Z", "generator": { "date": "2021-07-15T13:20:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2361-1", "initial_release_date": "2021-07-15T13:20:52Z", "revision_history": [ { "date": "2021-07-15T13:20:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_43-preempt-8-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_43-preempt-8-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_43-preempt-8-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "product_id": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:20:52Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_46-default-10-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_60-default-7-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_75-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-8-2.3.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_86-default-6-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_89-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_43-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-8-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-7-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-15T13:20:52Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2421-1
Vulnerability from csaf_suse
Published
2021-07-21 09:01
Modified
2021-07-21 09:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).
- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).
- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).
- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).
- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).
- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).
- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).
- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit (bnc#1186484).
- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).
- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).
- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).
- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()
- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).
- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).
- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).
The following non-security bugs were fixed:
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).
- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).
- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).
- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).
- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).
- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).
- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).
- net/packet: Remove redundant skb->protocol set (bsc#1176081).
- net: Do not set transport offset to invalid value (bsc#1176081).
- net: Introduce parse_protocol header_ops callback (bsc#1176081).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
Patchnames
SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116 ).\n- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).\n- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).\n- CVE-2021-33624: In kernel/bpf/verifier.c a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db (bnc#1187554).\n- CVE-2021-0605: In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1187601).\n- CVE-2021-0512: In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1187595).\n- CVE-2020-26558: Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (bnc#1179610).\n- CVE-2021-34693: net/can/bcm.c in the Linux kernel allowed local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized (bnc#1187452).\n- CVE-2020-36385: An issue was discovered in the Linux kernel drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).\n- CVE-2020-36386: An issue was discovered in the Linux kernel net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf (bnc#1187038).\n- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets (bnc#1185861).\n- CVE-2021-33200: kernel/bpf/verifier.c enforced incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit (bnc#1186484).\n- CVE-2021-33034: net/bluetooth/hci_event.c had a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value (bnc#1186111).\n- CVE-2020-26139: An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and made it easier to exploit other vulnerabilities in connected clients (bnc#1186062).\n- CVE-2021-23134: Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability (bnc#1186060).\n- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).\n- CVE-2020-26141: The Wi-Fi implementation did not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol (bnc#1185987).\n- CVE-2020-26145: The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration (bnc#1185860).\n- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).\n- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. ()\n- CVE-2021-3491: The io_uring subsystem allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. (bnc#1185642).\n- CVE-2021-23133: A race condition in SCTP sockets (net/sctp/socket.c) could lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket (bnc#1184675).\n- CVE-2021-32399: net/bluetooth/hci_request.c in the Linux kernel has a race condition for removal of the HCI controller (bnc#1184611 bnc#1185898).\n\nThe following non-security bugs were fixed:\n\n- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).\n- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).\n- af_packet: fix the tx skb protocol in raw sockets with ETH_P_ALL (bsc#1176081).\n- dm: fix redundant IO accounting for bios that need splitting (bsc#1183738).\n- kabi: preserve struct header_ops after bsc#1176081 fix (bsc#1176081).\n- net/ethernet: Add parse_protocol header_ops support (bsc#1176081).\n- net/mlx5e: Remove the wrong assumption about transport offset (bsc#1176081).\n- net/mlx5e: Trust kernel regarding transport offset (bsc#1176081).\n- net/packet: Ask driver for protocol if not provided by user (bsc#1176081).\n- net/packet: Remove redundant skb-\u003eprotocol set (bsc#1176081).\n- net: Do not set transport offset to invalid value (bsc#1176081).\n- net: Introduce parse_protocol header_ops callback (bsc#1176081).\n- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2421,SUSE-SLE-Module-Live-Patching-15-2021-2421,SUSE-SLE-Product-HA-15-2021-2421,SUSE-SLE-Product-HPC-15-2021-2421,SUSE-SLE-Product-SLES-15-2021-2421,SUSE-SLE-Product-SLES_SAP-15-2021-2421", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2421-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2421-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212421-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2421-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" }, { "category": "self", "summary": "SUSE Bug 1176081", "url": "https://bugzilla.suse.com/1176081" }, { "category": "self", "summary": "SUSE Bug 1179610", "url": "https://bugzilla.suse.com/1179610" }, { "category": "self", "summary": "SUSE Bug 1183738", "url": "https://bugzilla.suse.com/1183738" }, { "category": "self", "summary": "SUSE Bug 1184611", "url": "https://bugzilla.suse.com/1184611" }, { "category": "self", "summary": "SUSE Bug 1184675", "url": "https://bugzilla.suse.com/1184675" }, { "category": "self", "summary": "SUSE Bug 1185642", "url": "https://bugzilla.suse.com/1185642" }, { "category": "self", "summary": "SUSE Bug 1185725", "url": "https://bugzilla.suse.com/1185725" }, { "category": "self", "summary": "SUSE Bug 1185859", "url": "https://bugzilla.suse.com/1185859" }, { "category": "self", "summary": "SUSE Bug 1185860", "url": "https://bugzilla.suse.com/1185860" }, { "category": "self", "summary": "SUSE Bug 1185861", "url": "https://bugzilla.suse.com/1185861" }, { "category": "self", "summary": "SUSE Bug 1185862", "url": "https://bugzilla.suse.com/1185862" }, { "category": "self", "summary": "SUSE Bug 1185898", "url": "https://bugzilla.suse.com/1185898" }, { "category": "self", "summary": "SUSE Bug 1185987", "url": "https://bugzilla.suse.com/1185987" }, { "category": "self", "summary": "SUSE Bug 1186060", "url": "https://bugzilla.suse.com/1186060" }, { "category": "self", "summary": "SUSE Bug 1186062", "url": "https://bugzilla.suse.com/1186062" }, { "category": "self", "summary": "SUSE Bug 1186111", "url": "https://bugzilla.suse.com/1186111" }, { "category": "self", "summary": "SUSE Bug 1186463", "url": "https://bugzilla.suse.com/1186463" }, { "category": "self", "summary": "SUSE Bug 1186484", "url": "https://bugzilla.suse.com/1186484" }, { "category": "self", "summary": "SUSE Bug 1187038", "url": "https://bugzilla.suse.com/1187038" }, { "category": "self", "summary": "SUSE Bug 1187050", "url": "https://bugzilla.suse.com/1187050" }, { "category": "self", "summary": "SUSE Bug 1187215", "url": "https://bugzilla.suse.com/1187215" }, { "category": "self", "summary": "SUSE Bug 1187452", "url": "https://bugzilla.suse.com/1187452" }, { "category": "self", "summary": "SUSE Bug 1187554", "url": "https://bugzilla.suse.com/1187554" }, { "category": "self", "summary": "SUSE Bug 1187595", "url": "https://bugzilla.suse.com/1187595" }, { "category": "self", "summary": "SUSE Bug 1187601", "url": "https://bugzilla.suse.com/1187601" }, { "category": "self", "summary": "SUSE Bug 1188062", "url": "https://bugzilla.suse.com/1188062" }, { "category": "self", "summary": "SUSE Bug 1188116", "url": "https://bugzilla.suse.com/1188116" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26139 page", "url": "https://www.suse.com/security/cve/CVE-2020-26139/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26145 page", "url": "https://www.suse.com/security/cve/CVE-2020-26145/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26147 page", "url": "https://www.suse.com/security/cve/CVE-2020-26147/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26558 page", "url": "https://www.suse.com/security/cve/CVE-2020-26558/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36385 page", "url": "https://www.suse.com/security/cve/CVE-2020-36385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36386 page", "url": "https://www.suse.com/security/cve/CVE-2020-36386/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0129 page", "url": "https://www.suse.com/security/cve/CVE-2021-0129/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0605 page", "url": "https://www.suse.com/security/cve/CVE-2021-0605/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-22555 page", "url": "https://www.suse.com/security/cve/CVE-2021-22555/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23134 page", "url": "https://www.suse.com/security/cve/CVE-2021-23134/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32399 page", "url": "https://www.suse.com/security/cve/CVE-2021-32399/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33034 page", "url": "https://www.suse.com/security/cve/CVE-2021-33034/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33200 page", "url": "https://www.suse.com/security/cve/CVE-2021-33200/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33624 page", "url": "https://www.suse.com/security/cve/CVE-2021-33624/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-34693 page", "url": "https://www.suse.com/security/cve/CVE-2021-34693/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3609 page", "url": "https://www.suse.com/security/cve/CVE-2021-3609/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-07-21T09:01:19Z", "generator": { "date": "2021-07-21T09:01:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2421-1", "initial_release_date": "2021-07-21T09:01:19Z", "revision_history": [ { "date": "2021-07-21T09:01:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.75.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.75.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.75.1.aarch64", "product_id": "kernel-syms-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.75.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.75.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.75.1.noarch", "product_id": "kernel-devel-4.12.14-150.75.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.75.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.75.1.noarch", "product_id": "kernel-docs-4.12.14-150.75.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.75.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.75.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.75.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.75.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.75.1.noarch", "product_id": "kernel-macros-4.12.14-150.75.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.75.1.noarch", "product": { "name": "kernel-source-4.12.14-150.75.1.noarch", "product_id": "kernel-source-4.12.14-150.75.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.75.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.75.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.75.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.75.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.75.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.75.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.75.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.75.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.75.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.75.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.75.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-4.12.14-150.75.1.s390x", "product_id": "kernel-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.75.1.s390x", "product_id": "kernel-default-base-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.75.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.75.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.75.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.75.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.75.1.s390x", "product_id": "kernel-default-man-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.75.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.75.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.75.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.75.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.75.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.75.1.s390x", "product_id": "kernel-syms-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.75.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.75.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.75.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.75.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.75.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.75.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.75.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.75.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.75.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.75.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.75.1.x86_64", "product_id": "kernel-debug-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.75.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.75.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.75.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.75.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.75.1.x86_64", "product_id": "kernel-syms-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.75.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.75.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.75.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-26139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26139" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26139", "url": "https://www.suse.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "SUSE Bug 1186062 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1186062" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-26139", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-26139" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-26145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26145" } ], "notes": [ { "category": "general", "text": "An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26145", "url": "https://www.suse.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "SUSE Bug 1185860 for CVE-2020-26145", "url": "https://bugzilla.suse.com/1185860" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-26145" }, { "cve": "CVE-2020-26147", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26147" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26147", "url": "https://www.suse.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "SUSE Bug 1233723 for CVE-2020-26147", "url": "https://bugzilla.suse.com/1233723" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-26147" }, { "cve": "CVE-2020-26558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26558" } ], "notes": [ { "category": "general", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26558", "url": "https://www.suse.com/security/cve/CVE-2020-26558" }, { "category": "external", "summary": "SUSE Bug 1179610 for CVE-2020-26558", "url": "https://bugzilla.suse.com/1179610" }, { "category": "external", "summary": "SUSE Bug 1186463 for CVE-2020-26558", "url": "https://bugzilla.suse.com/1186463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-26558" }, { "cve": "CVE-2020-36385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36385" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36385", "url": "https://www.suse.com/security/cve/CVE-2020-36385" }, { "category": "external", "summary": "SUSE Bug 1187050 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1187050" }, { "category": "external", "summary": "SUSE Bug 1187052 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1187052" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1196914" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2020-36385", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2020-36385" }, { "cve": "CVE-2020-36386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36386" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36386", "url": "https://www.suse.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "SUSE Bug 1187038 for CVE-2020-36386", "url": "https://bugzilla.suse.com/1187038" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-36386", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2020-36386" }, { "cve": "CVE-2021-0129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0129" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0129", "url": "https://www.suse.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "SUSE Bug 1186463 for CVE-2021-0129", "url": "https://bugzilla.suse.com/1186463" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2021-0129" }, { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0605" } ], "notes": [ { "category": "general", "text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0605", "url": "https://www.suse.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "SUSE Bug 1187601 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187601" }, { "category": "external", "summary": "SUSE Bug 1187687 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187687" }, { "category": "external", "summary": "SUSE Bug 1188381 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1188381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-0605" }, { "cve": "CVE-2021-22555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-22555" } ], "notes": [ { "category": "general", "text": "A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-22555", "url": "https://www.suse.com/security/cve/CVE-2021-22555" }, { "category": "external", "summary": "SUSE Bug 1188116 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188116" }, { "category": "external", "summary": "SUSE Bug 1188117 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188117" }, { "category": "external", "summary": "SUSE Bug 1188411 for CVE-2021-22555", "url": "https://bugzilla.suse.com/1188411" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-22555" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-23134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23134" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23134", "url": "https://www.suse.com/security/cve/CVE-2021-23134" }, { "category": "external", "summary": "SUSE Bug 1186060 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186060" }, { "category": "external", "summary": "SUSE Bug 1186061 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1186061" }, { "category": "external", "summary": "SUSE Bug 1220739 for CVE-2021-23134", "url": "https://bugzilla.suse.com/1220739" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-23134" }, { "cve": "CVE-2021-32399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32399" } ], "notes": [ { "category": "general", "text": "net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32399", "url": "https://www.suse.com/security/cve/CVE-2021-32399" }, { "category": "external", "summary": "SUSE Bug 1184611 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1184611" }, { "category": "external", "summary": "SUSE Bug 1185898 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185898" }, { "category": "external", "summary": "SUSE Bug 1185899 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1185899" }, { "category": "external", "summary": "SUSE Bug 1196174 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1196174" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1200084" }, { "category": "external", "summary": "SUSE Bug 1201734 for CVE-2021-32399", "url": "https://bugzilla.suse.com/1201734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-32399" }, { "cve": "CVE-2021-33034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33034" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33034", "url": "https://www.suse.com/security/cve/CVE-2021-33034" }, { "category": "external", "summary": "SUSE Bug 1186111 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186111" }, { "category": "external", "summary": "SUSE Bug 1186285 for CVE-2021-33034", "url": "https://bugzilla.suse.com/1186285" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-33034" }, { "cve": "CVE-2021-33200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33200" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-\u003ealu_limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33200", "url": "https://www.suse.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "SUSE Bug 1186484 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186484" }, { "category": "external", "summary": "SUSE Bug 1186498 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1186498" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2021-33200", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-33200" }, { "cve": "CVE-2021-33624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33624" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33624", "url": "https://www.suse.com/security/cve/CVE-2021-33624" }, { "category": "external", "summary": "SUSE Bug 1187554 for CVE-2021-33624", "url": "https://bugzilla.suse.com/1187554" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2021-33624" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-34693", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-34693" } ], "notes": [ { "category": "general", "text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-34693", "url": "https://www.suse.com/security/cve/CVE-2021-34693" }, { "category": "external", "summary": "SUSE Bug 1187452 for CVE-2021-34693", "url": "https://bugzilla.suse.com/1187452" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2021-34693", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2021-34693" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3609", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3609" } ], "notes": [ { "category": "general", "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3609", "url": "https://www.suse.com/security/cve/CVE-2021-3609" }, { "category": "external", "summary": "SUSE Bug 1187215 for CVE-2021-3609", "url": "https://bugzilla.suse.com/1187215" }, { "category": "external", "summary": "SUSE Bug 1188323 for CVE-2021-3609", "url": "https://bugzilla.suse.com/1188323" }, { "category": "external", "summary": "SUSE Bug 1188720 for CVE-2021-3609", "url": "https://bugzilla.suse.com/1188720" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-3609", "url": "https://bugzilla.suse.com/1190276" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3609", "url": "https://bugzilla.suse.com/1196810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_75-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.75.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.75.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.75.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-21T09:01:19Z", "details": "moderate" } ], "title": "CVE-2021-3609" } ] }
suse-su-2021:2384-1
Vulnerability from csaf_suse
Published
2021-07-16 07:56
Modified
2021-07-16 07:56
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-57 fixes one issue.
The following security issue was fixed:
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2384,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2378,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2384
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-57 fixes one issue.\n\nThe following security issue was fixed:\n\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2384,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2378,SUSE-SLE-Module-Live-Patching-15-SP3-2021-2384", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2384-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2384-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212384-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2384-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009154.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)", "tracking": { "current_release_date": "2021-07-16T07:56:20Z", "generator": { "date": "2021-07-16T07:56:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2384-1", "initial_release_date": "2021-07-16T07:56:20Z", "revision_history": [ { "date": "2021-07-16T07:56:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "product_id": "kernel-livepatch-5_3_18-57-default-3-3.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "product_id": "kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-default-3-3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-57-default-3-3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-57-preempt-3-3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-57-preempt-3-3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-57-preempt-3-3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-57-default-3-3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-57-default-3-3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_64-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-57-default-3-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T07:56:20Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
suse-su-2021:2377-1
Vulnerability from csaf_suse
Published
2021-07-16 07:56
Modified
2021-07-16 07:56
Summary
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.
The following security issues were fixed:
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
Patchnames
SUSE-2021-2377,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2377,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2383
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-24_9 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)\n- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)\n- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2377,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2377,SUSE-SLE-Module-Live-Patching-15-SP2-2021-2383", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2377-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2377-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212377-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2377-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" }, { "category": "self", "summary": "SUSE Bug 1185901", "url": "https://bugzilla.suse.com/1185901" }, { "category": "self", "summary": "SUSE Bug 1187597", "url": "https://bugzilla.suse.com/1187597" }, { "category": "self", "summary": "SUSE Bug 1187687", "url": "https://bugzilla.suse.com/1187687" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0512 page", "url": "https://www.suse.com/security/cve/CVE-2021-0512/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0605 page", "url": "https://www.suse.com/security/cve/CVE-2021-0605/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2)", "tracking": { "current_release_date": "2021-07-16T07:56:10Z", "generator": { "date": "2021-07-16T07:56:10Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2377-1", "initial_release_date": "2021-07-16T07:56:10Z", "revision_history": [ { "date": "2021-07-16T07:56:10Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "product_id": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "product_id": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-22-preempt-13-5.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-22-preempt-13-5.2.x86_64", "product_id": "kernel-livepatch-5_3_18-22-preempt-13-5.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-0512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0512" } ], "notes": [ { "category": "general", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0512", "url": "https://www.suse.com/security/cve/CVE-2021-0512" }, { "category": "external", "summary": "SUSE Bug 1187595 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187595" }, { "category": "external", "summary": "SUSE Bug 1187597 for CVE-2021-0512", "url": "https://bugzilla.suse.com/1187597" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T07:56:10Z", "details": "important" } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0605", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0605" } ], "notes": [ { "category": "general", "text": "In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0605", "url": "https://www.suse.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "SUSE Bug 1187601 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187601" }, { "category": "external", "summary": "SUSE Bug 1187687 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1187687" }, { "category": "external", "summary": "SUSE Bug 1188381 for CVE-2021-0605", "url": "https://bugzilla.suse.com/1188381" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T07:56:10Z", "details": "important" } ], "title": "CVE-2021-0605" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-22-default-13-5.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-12-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-07-16T07:56:10Z", "details": "moderate" } ], "title": "CVE-2021-23133" } ] }
RHSA-2021:4140
Vulnerability from csaf_redhat
Published
2021-11-09 17:26
Modified
2025-04-14 21:32
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)
* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)
* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)
* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)
* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)
* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)
* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)
* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)
* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)
* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)
* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)
* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4140", "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1875275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275" }, { "category": "external", "summary": "1902412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1905747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-04-14T21:32:56+00:00", "generator": { "date": "2025-04-14T21:32:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2021:4140", "initial_release_date": "2021-11-09T17:26:23+00:00", "revision_history": [ { "date": "2021-11-09T17:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T17:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-14T21:32:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext broadcast fragments as full frames" }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26146" }, { "category": "external", "summary": "RHBZ#1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers" }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960504" } ], "notes": [ { "category": "description", "text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling mixed encrypted/plaintext fragments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "RHBZ#1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling mixed encrypted/plaintext fragments" }, { "cve": "CVE-2020-29368", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903244" } ], "notes": [ { "category": "description", "text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29368" }, { "category": "external", "summary": "RHBZ#1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906522" } ], "notes": [ { "category": "description", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "RHBZ#1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free" }, { "cve": "CVE-2020-36158", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913348" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "RHBZ#1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value" }, { "cve": "CVE-2020-36312", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1947991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "RHBZ#1947991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312" } ], "release_date": "2020-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c" }, { "cve": "CVE-2020-36386", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1969489" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "RHBZ#1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c" }, { "cve": "CVE-2021-0129", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965038" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "RHBZ#1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129" } ], "release_date": "2021-06-08T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability." }, { "cve": "CVE-2021-3348", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921958" } ], "notes": [ { "category": "description", "text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "RHBZ#1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "category": "external", "summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/", "url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c" }, { "acknowledgments": [ { "names": [ "Ryota Shiga" ] } ], "cve": "CVE-2021-3489", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959559" } ], "notes": [ { "category": "description", "text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "RHBZ#1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10", "url": "https://www.openwall.com/lists/oss-security/2021/05/11/10" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "cve": "CVE-2021-3600", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981954" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF 32-bit source register truncation on div/mod", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3600" }, { "category": "external", "summary": "RHBZ#1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600" }, { "category": "external", "summary": "https://lore.kernel.org/patchwork/patch/1379497/", "url": "https://lore.kernel.org/patchwork/patch/1379497/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1", "url": "https://www.openwall.com/lists/oss-security/2021/06/23/1" } ], "release_date": "2021-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF 32-bit source register truncation on div/mod" }, { "cve": "CVE-2021-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3635" }, { "category": "external", "summary": "RHBZ#1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635" } ], "release_date": "2021-08-06T04:47:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50" }, { "cve": "CVE-2021-3659", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1975949" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3659" }, { "category": "external", "summary": "RHBZ#1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8" } ], "release_date": "2021-04-06T19:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c" }, { "acknowledgments": [ { "names": [ "Haoran Luo" ], "organization": "Chaitin Tech" } ], "cve": "CVE-2021-3679", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989165" } ], "notes": [ { "category": "description", "text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in rb_per_cpu_empty()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3679" }, { "category": "external", "summary": "RHBZ#1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/", "url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/" } ], "release_date": "2021-07-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in rb_per_cpu_empty()" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3732", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3732" }, { "category": "external", "summary": "RHBZ#1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files" }, { "acknowledgments": [ { "names": [ "Loris Reiff" ] } ], "cve": "CVE-2021-20194", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912683" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20194" }, { "category": "external", "summary": "RHBZ#1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194" } ], "release_date": "2021-01-22T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()" }, { "cve": "CVE-2021-20239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923636" } ], "notes": [ { "category": "description", "text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20239" }, { "category": "external", "summary": "RHBZ#1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20239" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239" } ], "release_date": "2021-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-23133", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1948772" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sctp_destroy_sock list_del", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "RHBZ#1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" } ], "release_date": "2021-04-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sctp_destroy_sock list_del" }, { "cve": "CVE-2021-28950", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941762" } ], "notes": [ { "category": "description", "text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "RHBZ#1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode" }, { "cve": "CVE-2021-28971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941784" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "RHBZ#1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c" }, { "cve": "CVE-2021-29155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951595" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29155" }, { "category": "external", "summary": "RHBZ#1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/4" } ], "release_date": "2021-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-29646", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945345" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29646" }, { "category": "external", "summary": "RHBZ#1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c" }, { "cve": "CVE-2021-29650", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945388" } ], "notes": [ { "category": "description", "text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "RHBZ#1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS" }, { "acknowledgments": [ { "names": [ "Manfred Paul" ], "organization": "RedRocket CTF team" } ], "cve": "CVE-2021-31440", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964028" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local escalation of privileges in handling of eBPF programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31440" }, { "category": "external", "summary": "RHBZ#1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier", "url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local escalation of privileges in handling of eBPF programs" }, { "cve": "CVE-2021-31829", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1957788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31829" }, { "category": "external", "summary": "RHBZ#1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829" } ], "release_date": "2021-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-31916", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946965" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31916" }, { "category": "external", "summary": "RHBZ#1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a", "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2021/q1/268", "url": "https://seclists.org/oss-sec/2021/q1/268" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c" }, { "cve": "CVE-2021-33033", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961300" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33033" }, { "category": "external", "summary": "RHBZ#1961300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c" }, { "cve": "CVE-2021-33200", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965458" } ], "notes": [ { "category": "description", "text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "RHBZ#1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/27/1" } ], "release_date": "2021-05-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier" }, { "cve": "CVE-2021-46905", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266253" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL-deref on disconnect regression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "RHBZ#2266253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46905" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T" } ], "release_date": "2024-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL-deref on disconnect regression" }, { "cve": "CVE-2022-20166", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122089" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible buffer overflow in sysfs reading", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20166" }, { "category": "external", "summary": "RHBZ#2122089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166" } ], "release_date": "2022-08-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible buffer overflow in sysfs reading" } ] }
rhsa-2021:4356
Vulnerability from csaf_redhat
Published
2021-11-09 18:06
Modified
2025-04-14 21:33
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)
* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)
* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)
* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)
* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)
* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)
* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)
* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)
* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)
* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)
* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)
* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4356", "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1509204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204" }, { "category": "external", "summary": "1793880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880" }, { "category": "external", "summary": "1816493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493" }, { "category": "external", "summary": "1894101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101" }, { "category": "external", "summary": "1900844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1915825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1933527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527" }, { "category": "external", "summary": "1939341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1953847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847" }, { "category": "external", "summary": "1954588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1960708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1971101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101" }, { "category": "external", "summary": "1972278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278" }, { "category": "external", "summary": "1974627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627" }, { "category": "external", "summary": "1975182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679" }, { "category": "external", "summary": "1976699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1976969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969" }, { "category": "external", "summary": "1977162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162" }, { "category": "external", "summary": "1977422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422" }, { "category": "external", "summary": "1977537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537" }, { "category": "external", "summary": "1977850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850" }, { "category": "external", "summary": "1978369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369" }, { "category": "external", "summary": "1979070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070" }, { "category": "external", "summary": "1979680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1986138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1989999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999" }, { "category": "external", "summary": "1991976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976" }, { "category": "external", "summary": "1992700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "1996854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-04-14T21:33:04+00:00", "generator": { "date": "2025-04-14T21:33:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.2" } }, "id": "RHSA-2021:4356", "initial_release_date": "2021-11-09T18:06:54+00:00", "revision_history": [ { "date": "2021-11-09T18:06:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:06:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-04-14T21:33:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-0:4.18.0-348.el8.aarch64", "product_id": "perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-0:4.18.0-348.el8.ppc64le", "product_id": "perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-0:4.18.0-348.el8.x86_64", "product_id": "perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-0:4.18.0-348.el8.s390x", "product_id": "bpftool-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-0:4.18.0-348.el8.s390x", "product_id": "kernel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.s390x", "product": { "name": "perf-0:4.18.0-348.el8.s390x", "product_id": "perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.src", "product": { "name": "kernel-0:4.18.0-348.el8.src", "product_id": "kernel-0:4.18.0-348.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product_id": "kernel-doc-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2019-15794", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831055" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15794" }, { "category": "external", "summary": "RHBZ#1831055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794" } ], "release_date": "2019-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow" }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "Base